04272024Sat
Last updateTue, 23 Apr 2024 4pm
>>

Cybersecurity Challenges Emerge as NATO Summit Approaches: Expert Urges Proactive Solutions

The rising cybersecurity threat around political events is increasing in the coming weeks of the NATO Summit happening in Vilnius, Lithuania. Businesses directly and indirectly involved in these events face increased vulnerability and need to take proactive cyber security actions, expert Tomas Stamulis says.

The unprecedented rise in digital technologies and interconnected systems has paved the way for an escalating threat landscape in the field of cybersecurity. In the lead-up to the NATO Summit in Vilnius, Lithuania, increased cyber-attacks remind us that 'combat readiness' is mandatory for every organization operating within the digital space.

Expert warns to prepare not just for distributed denial of service (DDoS) attacks and a broad spectrum of other attack types. All security gaps are potential targets for exploitation.

Higher cybersecurity threat around political events

Heightened cyber attacks around political events are a common occurrence in today’s day and age. For example 2018, Russian hackers allegedly targeted the PyeongChang Winter Olympics, causing significant disruption. In 2020, a sophisticated cyber-espionage campaign reportedly targeted several organizations in the Tokyo Summer Olympics.

Tomas Stamulis, Cyber Security Architect at Baltic Amadeus, highlights the increased risk of businesses associated with political events, “The global network we're part of has made businesses more susceptible to risks arising from political events.”

Key threats and how to counter them

The consequences of a cyber-attack can be diverse, from hackers demanding a ransom to unlock data, launching a DDoS attack that incapacitates the entire system, or a hack leading to customer data leakage. The specific consequences depend primarily on the nature of the business itself.

Stamulis encourages proactive cybersecurity efforts. "Businesses should consider conducting penetration tests or engaging independent third-party experts to evaluate the security of their systems," Stamulis suggests. “Cyberattacks tend to target the most vulnerable areas using mass attacks. The first wave often targets a wide array of public and private companies, with subsequent steps determined by the success of the initial onslaught.”

As a result, Stamulis recommends strategic allocation of resources, “Businesses must allocate resources judiciously, applying additional measures where they are most needed. Haphazard application of security solutions only creates a patchwork defense that skilled hackers can readily exploit."

A wide range of techniques and social engineering solutions will be used, so systems must be set up appropriately and withstand potentially higher loads. Organizations relying on systems with direct internet access should ensure that their workforce is skilled in identifying cyber-attacks amidst the daily influx of information.
www.amadeus.com

 

comments
  • Latest Post

  • Most Read

  • Twitter

Who's Online

We have 15568 guests and one member online

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.